Abstract

Mobile Ad Hoc Networks (MANETs) are composed of a large number of devices that act as dynamic nodes with limited processing capabilities that can share data among each other. Energy efficient security is the major issue in MANETs where data encryption and decryption operations should be optimized to consume less energy. In this regard, we have focused on network coding which is a lightweight mechanism that can also be used for data confidentiality. In this paper, we have further reduced the cost of network coding mechanism by reducing the size of data used for permutation. The basic idea is that source permutes only global encoding vectors (GEVs) without permuting the whole message symbols which significantly reduces the complexity and transmission cost over the network. We have also proposed an algorithm for key generation and random permutation confusion key calculation. The proposed scheme achieves better performance in throughput, encryption time, and energy consumption as compared to previous schemes.

Highlights

  • Mobile Ad Hoc Networks (MANETs) have dynamic topology, which means, on requirement, devices act as nodes and establish a network for communication (Figure 1)

  • This paper presents an encryption scheme for MANETs which fully takes advantage of the security property of network coding

  • We proposed a partial permutation encryption algorithm for network coded MANETs

Read more

Summary

Introduction

Mobile Ad Hoc Networks (MANETs) have dynamic topology, which means, on requirement, devices act as nodes and establish a network for communication (Figure 1). Network encoding is used to transmit the maximum flow of data in a message by using encoding mechanism It achieves transmission and reduction in communication overhead and better throughput instead of just storing and forwarding as in traditional routing. The paper is organized as follows: Section 2 discusses the related work; Section 3 explores the proposed partial permutation based encryption scheme on network coded MANETs. Section 4 evaluates the performance and Section 5 concludes the work. At one point as depicted in the butterfly network, the intermediate node x is the bottleneck as it receives multiple packets but has a single channel to forward the packets.

Related Work
Preliminaries
Performance Analysis
Findings
Conclusion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call